Chapter 06 - Reading Organizer

advertisement
Chapter 6
Reading Organizer
After completion of this chapter, you should be able to:




Explain how network layer protocols and services support communications across data
networks.
Explain how routers enable end-to-end connectivity in a small to medium-sized business
network.
Determine the appropriate device to route traffic in a small to medium-sized business network.
Configure a router with basic configurations.
6.1 Network Layer Protocols
1. The network layer uses four basic processes. These are:
a. Addressing end devices
b. Encapsulation
c. Routing
d. De-encapsulation
2. There are several network layer protocols in existence; however, only the following two are
commonly implemented. These are:
a. Internet Protocol version 4 (IPv4)
b. Internet Protocol version 6 (IPv6)
3. List and explain the basic characteristics of IP.
a. Connectionless –
No connection with the destination is established before sending data packets.
b. Best Effort –
(unreliable) - Packet delivery is not guaranteed.
c. Media Independent –
Operation is independent of the medium carrying the data.
4. There is one major characteristic of the media that the network layer considers. This is:
The maximum size of the PDU that each medium can transport.
5. What is fragmenting the packet or fragmentation?
When an intermediate device, usually a router, must split up a packet when forwarding it from
one medium to a medium with a smaller MTU.
6. Mark the following IP characteristics as either:
1
a. Connectionless
b. Best Effort
c. Media Independent.
_____A____ Will send a packet even if the destination host is not able to receive it.
_____B____ Does not guarantee that the packet will be delivered fully without errors.
_____C____ Will adjust the size of the packet sent depending on what type of network access will be
used.
_____B____ Packet delivery is not guaranteed.
_____C____ Fiber optics cabling, satellites, and wireless can all be used to route the same packet.
_____A____ No contact is made with the destination host before sending a packet.
7. An IPv4 packet has two parts. These are:
a. IP Header
b. Payload
8. The fields used to identify and validate a packet, or reorder a fragmented packet include:
a. Internet Header Length (IHL)
b. Total Length
c. Header Checksum
9. Why would a router have to fragment a packet?
When forwarding it from one medium to another medium that has a smaller MTU.
10. Draw a line between the IPv4 header function and the correct category.
Version
Identifies the IP address of the recipient host
Total Length
Identifies the number of 32-bit words in the header
Time-to-Live
Always set to 0100 for IPv4
Protocol
Internet Header Length
Identifies the IP address of the sending host
Identifies the upper-layer protocol; to be used next
2
Destination IP Address
Maximum value is 65,535 bytes
Differentiated Services
Commonly referred to as hop count
Header Checksum
Identifies the priority for each packet
Source IP Address
Error-checks the IP header – if correct, the packet is
discarded
11. List and explain the three major issues IPv4 has.
a. IP address depletion –
IPv4 has a limited number of unique public IP addresses available. Although there are
approximately 4 billion IPv4 addresses, the increasing number of new IP-enabled devices,
always-on connections, and the potential growth of less-developed regions have increased the
need for more addresses.
b. Internet routing table expansion –
A routing table is used by routers to make best path determinations. As the number of servers
(nodes) connected to the Internet increases, so too does the number of network routes. These
IPv4 routes consume a great deal of memory and processor resources on Internet routers.
c. Lack of end-to-end connectivity –
Network Address Translation (NAT) is a technology commonly implemented within IPv4
networks. NAT provides a way for multiple devices to share a single public IP address. However,
because the public IP address is shared, the IP address of an internal network host is hidden.
This can be problematic for technologies that require end-to-end connectivity.
12. List four improvements that IPv6 provides.
a. Increased address space
b. Improved packet
c. Eliminates the need for
d. Integrated security
13. How many addresses does IPv6 provide?
340,282,366,920,938,463,463,374,607,431,768,211,456
14. The IPv6 simplified header offers several advantages over IPv4. These include:
3
a. Better routing efficiency for performance and forwarding-rate scalability
b. No requirement for processing checksums
c. Simplified and more efficient extension header mechanisms
d. A Flow Label field for per-flow processing with no need to open the transport inner packet to
identify the various traffic flows
15. The fields in the IPv6 header include:
a. Version
b. Traffic Class
c. Flow Label
d. Payload Length
e. Next Header
f. Hop Limit
g. Source Address
h. Destination Address
16. Draw a line between the IPV6 header description and the IPV6 header field to which it belongs.
Traffic Class
Hop Limit
Next Header
Version
Flow Label
Payload Length
Is always set to 0110
Identifies the packet fragment size
When this value reaches 0, the sender is notified that the packet
was not delivered
Classifies packets for congestion control
Identifies the application type to the upper-layer protocol
Can be set to use the same pathway flow so that packets are not
reordered upon delivery
6.2 Routing
17. Another role of the network layer is to direct packets between hosts. A host can send a packet to:
a. Itself
b. Local host
c. Remote host
18. The router connected to the local network segment is referred to as the ____default gateway____.
19. What is the purpose of a default gateway?
To route traffic from the local network to devices on remote networks.
4
20. Explain what a routing table is.
A routing table is a data file in RAM that is used to store route information about directly
connected network, as well as entries of remote networks the device has learned about.
21. The routing table of a local host typically contains what information?
a. Direct connection
b. Local network route
c. Local default route
22. The default gateway is only used when a host must forward packets to a remote network. When is
a default gateway not required, or needed to be configured?
If you are only sending packets to devices on the local network.
23. What commands on a Windows host can be used to display the host routing table?
a. route print
b. netstat -r
24. Identify the five different destination address sections shown in the netstat –r output.
___The local default route___
____Loopback addresses___
_______Local network______
____Multicast addresses____
_____Limited broadcast_____
5
25. List and explain what the routing table of a router stores information about.
a. Directly-connected routes –
These routes come from the active router interfaces. Routers add a directly connected route
when an interface is configured with an IP address and is activated. Each of the router's
interfaces is connected to a different network segment. Routers maintain information about
the network segments that they are connected to within the routing table.
b. Remote routes –
These routes come from remote networks connected to other routers. Routes to these
networks can either be manually configured on the local router by the network administrator or
dynamically configured by enabling the local router to exchange routing information with other
routers using dynamic routing protocols.
26. What does a local host require to send packets to a remote destination?
A default gateway
27. What command is used on a Cisco IOS router to display the routing table information?
show ip route
28. What does each circled part of the routing table below tell the network administrator?
_____How the route was learned_____
___Identifies the interface through which the routes reaches the destination network__
C
L
C
192.168.10.0/24 is directly connected, GigabitEthernet0/0
192.168.10.1/32 is directly connected, GigabitEthernet0/0
220.200.20.0/24 is directly connected, GigabitEthernet0/1
_____The destination network and how it was learned_____
6
29. Explain what the following letters in the routing table represent?
a. ____C____ Identifies a directly connected network. Directly connected networks are automatically created
when an interface is configured with an IP address and activated.
b. ____L____ Identifies that this is a link local route. Link local routes are automatically created when an
interface is configured with an IP address and activated.
c. ____S____ Identifies that the route was manually created by an administrator to reach a specific network.
This is known as a static route.
d. ____D____ Identifies that the route was learned dynamically from another router using the Enhanced
Interior Gateway Routing Protocol (EIGRP).
e. ____O____ Identifies that the route was learned dynamically from another router using the Open Shortest
Path First (OSPF) routing protocol.
30. Based on the routing table entry shown what is the….
D
200.20.2.0/24 [90/2170112]
via 10.250.1.1,
a. Route Source (which protocol)–
EIGRP
b. Destination Network –
200.20.2.0/24
c. Administrative Distance –
90
d. Metric –
2170112
e. Next-hop –
10.250.1.1
f. Route timestamp –
00:15:35
7
00:15:35, Serial0/0/1
g. Outgoing interface –
Serial0/0/1
31. Which metric has the highest priority; 2170112 or 1?
1
32. If a router receives a packet to a destination network that is not in the routing table and no default
gateway is available, what happens to the packet?
The packet is dropped
33.
Based on the graphic assign the correct letter to each statement.
_____B____ Shows the destination network.
_____C____ The administrative distance (source) and metric to reach the remote network.
_____A____ How the network was learned by the router.
_____F_____ The outgoing interface on the router to reach the destination network.
_____E____ The elapsed time since the network was discovered.
8
_____D____The next hop IP address to reach the remote network.
6.3 Routers
34. All router models are essentially computers. Just like computers, tablets, and smart devices, routers
also require:
a. Operating systems (OS)
b. Central processing units (CPU)
c. Random-access memory (RAM)
d. Read-only memory (ROM)
35. A router also has special memory that includes:
Flash and nonvolatile random-access memory (NVRAM)
36. A router has access to four types of memory. Explain each.
a. RAM –
RAM is used to store various applications and processes including:
Cisco IOS - The IOS is copied into RAM during bootup.
Running configuration file - This is the configuration file that stores the configuration
commands that the router IOS is currently using. It is also known as the running-config.
IP routing table - This file stores information about directly-connected and remote
networks. It is used to determine the best path to use to forward packets.
ARP cache - This cache contains the IPv4 address to MAC address mappings, similar to
the Address Resolution Protocol (ARP) cache on a PC. The ARP cache is used on routers
that have LAN interfaces, such as Ethernet interfaces.
Packet buffer - Packets are temporarily stored in a buffer when received on an interface
or before they exit an interface.
Like computers, Cisco routers actually use dynamic random-access memory (DRAM).
DRAM –
It stores the instructions and data needed to be executed by the CPU.
b. ROM –
Cisco routers use ROM to store:
Bootup instructions - Provides the startup instructions.
9
Basic diagnostic software - Performs the power-on self-test (POST) of all components.
Limited IOS - Provides a limited backup version of the OS, in case the router cannot load
the full featured IOS.
c. NVRAM –
Is used by the Cisco IOS as permanent storage for the startup configuration file (startup-config).
d. Flash memory –
Is non-volatile computer memory used as permanent storage for the IOS and other system
related files.
37. Identify the internal components of this 1841 router.
___Power Supply___
___Nonvolatile RAM (NVRAM)___
___Shield for WAN Interface Card___
10
___Shield for WAN Interface Card___
___CPU___
___Fan ___
___Synchronous Dynamic RAM (SDRAM)___
___Advanced Integrated Module (AIM)___
38. Identify the ports on this 1941 ISR.
11
39. The connections on a Cisco router can be grouped into two categories. List and explain each.
a. Management ports –
These are the console and auxiliary ports used to configure, manage, and troubleshoot the
router. Unlike LAN and WAN interfaces, management ports are not used for packet forwarding.
b. Inband Router interfaces –
These are the LAN and WAN interfaces configured with IP addressing to carry user traffic.
Ethernet interfaces are the most common LAN connections, while common WAN connections
include serial and DSL interfaces.
40. Similar to a Cisco switch, there are several ways to access the CLI environment on a Cisco router.
List and explain the most common methods.
a. Console –
12
Uses a low speed serial or USB connection to provide direct connect, out-of-band management
access to a Cisco device.
b. Telnet or SSH –
Two methods for remotely accessing a CLI session across an active network interface.
c. AUX port –
Used for remote management of the router using a dial-up telephone line and modem.
41. Router interfaces can be grouped into two categories. List and explain both.
a. Ethernet LAN interfaces –
Used for connecting cables that terminate with LAN devices, such as computers and switches.
This interface can also be used to connect routers to each other. Several conventions for
naming Ethernet interfaces are popular: the older Ethernet, FastEthernet, and Gigabit Ethernet.
The name used depends on the device type and model.
b. Serial WAN interfaces –
Used for connecting routers to external networks, usually over a larger geographical distance.
Similar to LAN interfaces, each serial WAN interface has its own IP address and subnet mask,
which identifies it as a member of a specific network.
42. Draw a line between the router component name and the correct function/description.
WAN interface
A way to remotely access the CLI across a network interface.
Aux port
Connects computers, switches, and routers for internal networking.
LAN interface
A port to manage routers – using telephone lines and modems.
Telnet or SSH
Connects routers to external networks, usually over a large distance.
Console port
A local port which uses USB or low-speed, serial connections to manage
network devices.
43.
Where is the Cisco IOS stored?
Flash Memory
44. During boot up the Cisco IOS is copied into?
RAM
45. Which two files are loaded when a router is booted?
13
a. IOS Image File
b. Startup Configuration File
46. There are three major phases to the bootup process. These are:
a. Perform the POST and load the bootstrap program.
b. Locate and load the Cisco IOS software.
c. Locate and load the startup configuration file or enter setup mode.
47. What command can be used to verify and troubleshoot some of the basic hardware and software
components of the router?
show version
48. The output from the show version command includes:
a. IOS version
b. ROM Bootstrap Program
c. Location of IOS
d. CPU and Amount of RAM
e. Interfaces
f. Amount of NVRAM and Flash
49. The configuration register has several uses, such as:
Password recovery
50. The factory default setting for the configuration register is 0x2102. What does this value mean?
This value indicates that the router attempts to load a Cisco IOS software image from flash
memory and load the startup configuration file from NVRAM.
51. List the four steps to the router boot process in correct order.
a. Preform POST
b. Load Bootstrap
c. Load the IOS
d. Load the configuration file from flash
6.4 Configuring a Cisco Router
52. What are the recommended steps that should be completed when configuring initial settings on a
router?
1. Assign a device name
14
2. Set passwords
a. Secure privileged EXEC mode
b. Secure the console port
c. Secure virtual access
d. Set the service password-encryption
3. Set the banner motd (message of the day MOTD)
4. Save the configuration
5. Verify the configuration using the show run command
53. What steps are required to activate a router interface?
a. IPv4 address and subnet mask
b. Activate the interface
54. There are several commands that can be used to verify interface configuration. Which is the most useful of
these is the commands?
show ip interface brief
55. What are three other commands that can be used to verify interface configuration?
a. show ip route
b. show interfaces
c. show ip interface
56. For an end device to communicate over the network, it must be configured with the correct IP
address information, including the default gateway address. When is the default gateway used?
When the host wants to send a packet to a device on another network.
57. Where is the default gateway generally located?
The router interface address attached to the local network of the host.
58. What is the command used to configure the default gateway 10.250.1.1 on a switch?
S1(config)# ip default-gateway 10.250.1.1
59. A common misconception is that the switch uses its configured default gateway address to
determine where to forward packets originating from hosts connected to the switch and destined for
hosts on a remote network. What does the switch use its default gateway for?
The IP address and default gateway information is only used for packets that originate from the
switch. Packets originating from hosts connected to the switch must already have default
gateway information configured to communicate on remote networks.
15
16
Download
Study collections